The SCEAS System
Navigation Menu

Conferences in DBLP

2007 (conf/IEEEares/2007)

  1. Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. [Citation Graph (, )][DBLP]

  2. From Trust to Dependability through Risk Analysis. [Citation Graph (, )][DBLP]

  3. Dynamic trust domains for secure, private, technology-assisted living. [Citation Graph (, )][DBLP]

  4. A Hybrid Trust Model for Enhancing Security in Distributed Systems. [Citation Graph (, )][DBLP]

  5. A Reliable Component-Based Architecture for E-Mail Filtering. [Citation Graph (, )][DBLP]

  6. Availability and Performance of the Adaptive Voting Replication. [Citation Graph (, )][DBLP]

  7. Distributed Stream Processing Analysis in High Availability Context. [Citation Graph (, )][DBLP]

  8. Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. [Citation Graph (, )][DBLP]

  9. Failure Recovery in Cooperative Data Stream Analysis. [Citation Graph (, )][DBLP]

  10. A Recovery Protocol for Middleware Replicated Databases Providing GSI. [Citation Graph (, )][DBLP]

  11. Revisiting Hot Passive Replication. [Citation Graph (, )][DBLP]

  12. Reputation Management Survey. [Citation Graph (, )][DBLP]

  13. Dirichlet Reputation Systems. [Citation Graph (, )][DBLP]

  14. Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. [Citation Graph (, )][DBLP]

  15. Secure Anonymous Union Computation Among Malicious Partners. [Citation Graph (, )][DBLP]

  16. A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. [Citation Graph (, )][DBLP]

  17. Privacy in Pervasive Computing and Open Issues. [Citation Graph (, )][DBLP]

  18. Context-Dependent Access Control for Contextual Information. [Citation Graph (, )][DBLP]

  19. Bytecode Verification for Enhanced JVM Access Control. [Citation Graph (, )][DBLP]

  20. Automatic Failure Detection with Separation of Concerns. [Citation Graph (, )][DBLP]

  21. A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks. [Citation Graph (, )][DBLP]

  22. Intrusion detection system for signal based SIP attacks through timed HCPN. [Citation Graph (, )][DBLP]

  23. 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. [Citation Graph (, )][DBLP]

  24. Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. [Citation Graph (, )][DBLP]

  25. Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network. [Citation Graph (, )][DBLP]

  26. Errors in Attacks on Authentication Protocols. [Citation Graph (, )][DBLP]

  27. Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. [Citation Graph (, )][DBLP]

  28. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. [Citation Graph (, )][DBLP]

  29. Authentication Mechanisms for Mobile Agents. [Citation Graph (, )][DBLP]

  30. Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. [Citation Graph (, )][DBLP]

  31. Implicit Authorization for Accessing Location Data in a Social Context. [Citation Graph (, )][DBLP]

  32. Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. [Citation Graph (, )][DBLP]

  33. A Reconfigurable Implementation of the New Secure Hash Algorithm. [Citation Graph (, )][DBLP]

  34. Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. [Citation Graph (, )][DBLP]

  35. A Framework for the Development of Secure Data Warehouses based on MDA and QVT. [Citation Graph (, )][DBLP]

  36. Design of a Process for Software Security. [Citation Graph (, )][DBLP]

  37. STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  38. A secure architecture for the pseudonymization of medical data. [Citation Graph (, )][DBLP]

  39. Collection of Quantitative Data on Security Incidents. [Citation Graph (, )][DBLP]

  40. Security vulnerabilities in DNS and DNSSEC. [Citation Graph (, )][DBLP]

  41. Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). [Citation Graph (, )][DBLP]

  42. Applying a Tradeoff Model (TOM) to TACT. [Citation Graph (, )][DBLP]

  43. A Pattern System for Security Requirements Engineering. [Citation Graph (, )][DBLP]

  44. Security Requirements for a Semantic Service-oriented Architecture. [Citation Graph (, )][DBLP]

  45. Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. [Citation Graph (, )][DBLP]

  46. A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. [Citation Graph (, )][DBLP]

  47. Static evaluation of Certificate Policies for GRID PKIs interoperability. [Citation Graph (, )][DBLP]

  48. Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. [Citation Graph (, )][DBLP]

  49. Universally Composable Three-Party Key Distribution. [Citation Graph (, )][DBLP]

  50. An Efficient eAuction Protocol. [Citation Graph (, )][DBLP]

  51. Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes. [Citation Graph (, )][DBLP]

  52. A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network. [Citation Graph (, )][DBLP]

  53. Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems. [Citation Graph (, )][DBLP]

  54. Dependability Aspects of Ubiquitous Computing. [Citation Graph (, )][DBLP]

  55. Concurrency Control using Subject- and Purpose-Oriented (SPO) View. [Citation Graph (, )][DBLP]

  56. Comparing Classifier Combining Techniques for Mobile-Masquerader Detection. [Citation Graph (, )][DBLP]

  57. Process Profiling Using Frequencies of System Calls. [Citation Graph (, )][DBLP]

  58. Terrorist Networks Analysis through Argument Driven Hypotheses Model. [Citation Graph (, )][DBLP]

  59. High Availability for Network Management Applications. [Citation Graph (, )][DBLP]

  60. RWAR: A Resilient Window-consistent Asynchronous Replication Protocol. [Citation Graph (, )][DBLP]

  61. Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model. [Citation Graph (, )][DBLP]

  62. Realizing fine-granular Read andWrite Rights on Tree Structured Documents. [Citation Graph (, )][DBLP]

  63. Access Control Model for Web Services with Attribute Disclosure Restriction. [Citation Graph (, )][DBLP]

  64. Aggregating and Deploying Network Access Control Policies. [Citation Graph (, )][DBLP]

  65. Secure Spatial Authentication using Cell Phones. [Citation Graph (, )][DBLP]

  66. Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. [Citation Graph (, )][DBLP]

  67. A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. [Citation Graph (, )][DBLP]

  68. Improved Client-to-Client Password-Authenticated Key Exchange Protocol. [Citation Graph (, )][DBLP]

  69. Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. [Citation Graph (, )][DBLP]

  70. Models for automatic generation of safety-critical real-time systems. [Citation Graph (, )][DBLP]

  71. A Near-Real-Time Behaviour Control Framework. [Citation Graph (, )][DBLP]

  72. RFID Security Issues in Military Supply Chains. [Citation Graph (, )][DBLP]

  73. The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. [Citation Graph (, )][DBLP]

  74. Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. [Citation Graph (, )][DBLP]

  75. A Modular Architecture for Secure and Reliable Distributed Communication. [Citation Graph (, )][DBLP]

  76. Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials. [Citation Graph (, )][DBLP]

  77. Securing Medical Sensor Environments: The CodeBlue Framework Case. [Citation Graph (, )][DBLP]

  78. A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. [Citation Graph (, )][DBLP]

  79. Agent Alliances: A Means for Practical Threshold Signature. [Citation Graph (, )][DBLP]

  80. Protecting Online Transactions with Unique Embedded Key Generators. [Citation Graph (, )][DBLP]

  81. A research agenda for Autonomous Business Process Management. [Citation Graph (, )][DBLP]

  82. Secure Web Application Development and Global Regulation. [Citation Graph (, )][DBLP]

  83. Query Assurance Verification for Dynamic Outsourced XML Databases. [Citation Graph (, )][DBLP]

  84. A Reflection-Based Framework for Content Validation. [Citation Graph (, )][DBLP]

  85. Web Engineering Security: Essential Elements. [Citation Graph (, )][DBLP]

  86. Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology. [Citation Graph (, )][DBLP]

  87. CSP-Based Firewall Rule Set Diagnosis using Security Policies. [Citation Graph (, )][DBLP]

  88. CASSIS - Computer-based Academy for Security and Safety in Information Systems. [Citation Graph (, )][DBLP]

  89. Trust in global computing systems as a limit property emerging from short range random interactions. [Citation Graph (, )][DBLP]

  90. A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. [Citation Graph (, )][DBLP]

  91. HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. [Citation Graph (, )][DBLP]

  92. A Semantic and Time Related Recommendation-Feedback Trust Model. [Citation Graph (, )][DBLP]

  93. AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. [Citation Graph (, )][DBLP]

  94. Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. [Citation Graph (, )][DBLP]

  95. A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. [Citation Graph (, )][DBLP]

  96. On the Assessment of the Interaction Quality of Users with Cerebral Palsy. [Citation Graph (, )][DBLP]

  97. Research and Design of Mobile Impeachment System with Semi-cryptonym. [Citation Graph (, )][DBLP]

  98. Efficient Malicious Agreement in a Virtual Subnet Network. [Citation Graph (, )][DBLP]

  99. Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. [Citation Graph (, )][DBLP]

  100. Application of QVT for the Development of Secure Data Warehouses: A case study. [Citation Graph (, )][DBLP]

  101. Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. [Citation Graph (, )][DBLP]

  102. Applying a Flexible Mining Architecture to Intrusion Detection. [Citation Graph (, )][DBLP]

  103. An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  104. Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. [Citation Graph (, )][DBLP]

  105. Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. [Citation Graph (, )][DBLP]

  106. A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. [Citation Graph (, )][DBLP]

  107. Reliability Markov Chains for Security Data Transmitter Analysis. [Citation Graph (, )][DBLP]

  108. Requirements and Evaluation Procedures for eVoting. [Citation Graph (, )][DBLP]

  109. Towards Secure E-Elections in Turkey: Requirements and Principles. [Citation Graph (, )][DBLP]

  110. On Coercion-Resistant Electronic Elections with Linear Work. [Citation Graph (, )][DBLP]

  111. A Security Model and Architecture for Multichannel E-Government Systems. [Citation Graph (, )][DBLP]

  112. eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. [Citation Graph (, )][DBLP]

  113. Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. [Citation Graph (, )][DBLP]

  114. Secure Distributed Dossier Management in the Legal Domain. [Citation Graph (, )][DBLP]

  115. Building a Dependable Messaging Infrastructure for Electronic Government. [Citation Graph (, )][DBLP]

  116. A Universal Construction for Concurrent Objects. [Citation Graph (, )][DBLP]

  117. FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. [Citation Graph (, )][DBLP]

  118. On the implementation of the Omega failure detector in the crash-recovery failure model. [Citation Graph (, )][DBLP]

  119. Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. [Citation Graph (, )][DBLP]

  120. Self-Stabilization as a Foundation for Autonomic Computing. [Citation Graph (, )][DBLP]

  121. On Programming Models for Service-Level High Availability. [Citation Graph (, )][DBLP]

  122. Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. [Citation Graph (, )][DBLP]

  123. How can the developer benefit from security modeling? [Citation Graph (, )][DBLP]

  124. AProSec: an Aspect for Programming Secure Web Applications. [Citation Graph (, )][DBLP]

  125. Empirical and statistical analysis of risk analysis-driven techniques for threat management. [Citation Graph (, )][DBLP]

  126. Secure Software Development through Coding Conventions and Frameworks. [Citation Graph (, )][DBLP]

  127. Pastures: Towards Usable Security Policy Engineering. [Citation Graph (, )][DBLP]

  128. Security Objectives within a Security Testing Case Study. [Citation Graph (, )][DBLP]

  129. CppTest: A Prototype Tool for Testing C/C++ Programs. [Citation Graph (, )][DBLP]

  130. A Novel Approach to Building Secure Systems. [Citation Graph (, )][DBLP]

  131. Exception Handling in an Event-Driven System. [Citation Graph (, )][DBLP]

  132. Issues in Testing Dependable Event-Based Systems at a Systems Integration Company. [Citation Graph (, )][DBLP]

  133. Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms. [Citation Graph (, )][DBLP]

  134. Event-Based Monitoring of Open Source Software Projects. [Citation Graph (, )][DBLP]

  135. Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System. [Citation Graph (, )][DBLP]

  136. Indexing and Search of Correlated Business Events. [Citation Graph (, )][DBLP]

  137. An Approach for Adaptive Intrusion Prevention Based on The Danger. [Citation Graph (, )][DBLP]

  138. A Human-Verifiable Authentication Protocol Using Visible Laser Light. [Citation Graph (, )][DBLP]

  139. Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. [Citation Graph (, )][DBLP]

  140. ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. [Citation Graph (, )][DBLP]

  141. A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. [Citation Graph (, )][DBLP]

  142. Analysis on Bleichenbacher's Forgery Attack. [Citation Graph (, )][DBLP]

  143. A New Method for Reducing the Revocation Delay in the Attribute Authentication. [Citation Graph (, )][DBLP]

  144. Efficient Multiparty Computation for Comparator Networks. [Citation Graph (, )][DBLP]

  145. Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. [Citation Graph (, )][DBLP]

  146. Attacks are Protocols Too. [Citation Graph (, )][DBLP]

  147. Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. [Citation Graph (, )][DBLP]

  148. On the use of one-way chain based authentication protocols in secure control systems. [Citation Graph (, )][DBLP]

  149. Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. [Citation Graph (, )][DBLP]

  150. A Security Framework in RFID Multi-domain System. [Citation Graph (, )][DBLP]

  151. E-Learning 2.0 = e-Learning 1.0 + Web 2.0? [Citation Graph (, )][DBLP]

  152. Blended Learning Technology in Information Security Management Courses. [Citation Graph (, )][DBLP]

  153. Defining a Trusted Service-Oriented Network Environment. [Citation Graph (, )][DBLP]

  154. Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002